Sciweavers

18374 search results - page 21 / 3675
» Applications for data hiding
Sort
View
IH
1998
Springer
13 years 12 months ago
Information Hiding to Foil the Casual Counterfeiter
Abstract. Security documents (currency, treasury bills, stocks, bonds, birth certificates, etc.) provide an interesting problem space for investigating information hiding. Recent a...
Daniel Gruhl, Walter Bender
VLDB
2007
ACM
89views Database» more  VLDB 2007»
14 years 1 months ago
GhostDB: Hiding Data from Prying Eyes
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Christophe Salperwyck, Nicolas Anciaux, Mehdi Benz...
ICIP
1999
IEEE
14 years 9 months ago
Data Hiding in Video
We propose a video data embedding scheme in which the embedded signature data is reconstructed without knowing the original host video. The proposed method enables high rate of da...
Jong Jin Chae, B. S. Manjunath
CSCW
2004
ACM
14 years 1 months ago
Collaborative modeling: hiding UML and promoting data examples in NEMo
Domain experts are essential for successful software development, but these experts may not recognize their ideas when abstracted into Unified Modeling Language (UML) or ontologie...
Patricia K. Schank, Lawrence Hamel
PCM
2005
Springer
88views Multimedia» more  PCM 2005»
14 years 1 months ago
A Robust Method for Data Hiding in Color Images
In this paper, we propose a methodology for embedding watermark image data into color images. At the transmitter, the signature image is encoded by a multiple description encoder. ...
Mohsen Ashourian, Payman Moallem, Yo-Sung Ho